Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities.
Ertem Nusret TasDavid TseFangyu GaiSreeram KannanMohammad Ali Maddah-AliFisher YuPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- information security
- access control
- trusted third party
- security problems
- intrusion detection
- network security
- computer security
- statistical databases
- security requirements
- security issues
- security policies
- security management
- data security
- security level
- information assurance
- security threats
- neural network
- security properties
- security systems
- security protocols
- theorem proving
- low cost